How do you protect critical infrastructure—the systems that keep the lights on, water flowing, and communities functioning—from threats that span cyberspace, geopolitics, and emerging technology? That’s the question host Paul Ducklin explored with Joseph M. Saunders,...
AI is now woven into the everyday workflows of embedded engineers. It writes code, generates tests, reviews logs, and scans for vulnerabilities. But the same tools that speed up development are introducing new risks—many of which can compromise the stability of...
When people picture AI in defense, they usually imagine automated drones, robotic soldiers, or high-stakes scenarios at the edge of conflict. But generative AI’s biggest impact today isn’t on the front lines at all but in the workflows, decisions, and systems behind...
Meeting ICS cybersecurity standards, such as IEC 62443 and NIST 800-82, requires more than just documenting policies or checking boxes. Industrial control systems rely on complex, layered software stacks—much of it legacy, third-party, or built with older...
Anyone working in software development in the Department of War over the past five years has seen the requirements landscape shift significantly. From the introduction of SBOM mandates to the Software Fast Track (SWFT) initiative launched in May 2025, the DoD is...